Chapter9 - cloud Security 1 جديد
Chapter9 - cloud Security 1 جديد
Chapter 9
• Contents
Security in an interconnected world, cloud security risks.
Attacks in a cloud environment, top threats.
Security, a major concern for cloud users.
Privacy.
Trust.
Operating systems security.
Virtual machine security.
Security of virtualization.
Security risks posed by shared images.
Security risks posed by a management OS.
• Computer security in the new millennium
Malware can travel easily across national borders, infect
systems worldwide, and transfer from one system to another in
today's networked environment.
As society grows more and more dependent on the information
infrastructure, the security of computing and communication
networks becomes even more important. Vulnerabilities in
computer security can be used to target even a country's
essential infrastructure.
Recently, the term cyberwarfare has entered the dictionary
meaning “actions by a nation-state to penetrate another nation's
computers or networks for the purposes of causing damage or
disrupt
• Cloud security
A computer cloud is a target-rich environment for malicious individuals
and criminal organizations.
Major concern for existing users and for potential new users of cloud computing services.
Outsourcing computing to a cloud generates new security and privacy concerns.
Standards, regulations, and laws governing the activities of organizations supporting cloud
computing have yet to be adopted. Many issues related to privacy, security, and trust in cloud
computing are far from being settled.
There is the need for international regulations adopted by the countries where data centers of
cloud computing providers are located.
Service Level Agreements (SLAs) do not provide adequate legal protection for cloud computer
users, often left to deal with events beyond their control.
• Cloud security risks
Traditional threats impact amplified due to the vast amount of cloud
resources and the large user population that can be affected. The fuzzy
bounds of responsibility between the providers of cloud services and
users and the difficulties to accurately identify the cause.
New threats cloud servers host multiple VMs; multiple applications
may run under each VM. Multi-tenancy and VMM vulnerabilities open
new attack channels for malicious users. Identifying the path followed
by an attacker more difficult in a cloud environment.
Authentication and authorization the procedures in place for one
individual does not extend to an enterprise.
Third-party control (external organization or service provider) generates a spectrum of
concerns caused by the lack of transparency and limited user control.
• In other words, Users do not have direct visibility into how the cloud provider manages their data,
applications, or infrastructure. This lack of insight can lead to concerns about how securely their data is
handled, where it is stored, or how it is processed
Availability of cloud services system failures, power outages, and
other catastrophic events could shutdown services for extended periods of time
• Attacks in a cloud computing environment
Three actors involved; six types of attacks possible.
The user can be attacked by:
Service
• SSL certificate spoofing: An attacker creates a spoof SSL certificate that mimics a real one that a
cloud provider uses. Users may be tricked into accepting a fake certificate when they connect to
the cloud serviattacks on browser cachesce, thinking they are safely connected to the authentic
service.
• attacks on browser caches: Attackers exploit vulnerabilities in the user's browser cache, where data
from previous browsing sessions is stored temporarily. This can include sensitive information like
authentication tokens, session cookies, or cached web pages from the cloud service.
• phishing attacks: Attackers send deceptive messages (emails, texts, etc.) pretending to be from a
trusted cloud service provider. These messages often contain links to fake websites that look
identical to the legitimate cloud service login page.
The cloud infrastructure attacks that either originates at the cloud or spoofs to originate from the cloud
infrastructure
•
• Auditability of cloud activities
The lack of transparency makes auditability a very difficult proposition for cloud computing.
Auditing guidelines elaborated by the National Institute of Standards (NIST) such as the Federal
Information Processing Standard (FIPS) and the Federal Information Security Management Act
(FISMA) are mandatory for US Government agencies
Cloud CIA security model
• Due to the multi-tenancy structure of the cloud computing
system, cloud data is highly vulnerable to a number of
security threats.
• However, the level of vulnerability of the cloud resources
depends on the cloud delivery model(IAAS,SAAS,PAAS) used
by a cloud service consumer.
• The major challenges of cloud resources are confidentiality,
integrity and availability (CIA)
Data confidentiality
• Data confidentiality in cloud computing refers to the protection of
data from unauthorized access or disclosure while it is stored,
processed, or transmitted in the cloud.
• Data privacy is a simplified version of data confidentiality.
• Data privacy is the guarantee that an individual's personal
information will never be shared with third parties.
• However, since sharing is illegal, maintaining privacy is far simpler
than maintaining confidentiality.
• Data security in public clouds is the exclusive responsibility of the
cloud service provider. Resource management, task scheduling, and
virtualization are used to enforce data confidentiality.
• On the other hand, with cross-VM sidechannel attacks, attackers can
obtain complete access to the host and retrieve data from a target
virtual machine on the same system.
• Note:
• cross-VM side-channel attack
• One kind of security vulnerability in virtualized systems
• in which a malicious virtual machine (VM) uses shared hardware resources to
get private data from other VMs co-located on the same physical host.
• By taking advantage of the common infrastructure of cloud settings and the
basic features of virtualization, these attacks are able to break the separation
between virtual machines and obtain unauthorised data.
CASE STUDY EXAMPLE
Note: these examples are from the book:Cloud Computing Concepts, Technology & Architecture
Data integrity
• The process of making sure that cloud customers' data is
protected from unauthorised modification—that is, that
the data hasn't been altered in any way by outside parties
.
• The cloud service provider must make sure that access
restrictions to data in transit or storage are enforced
against third parties in order to guarantee data integrity.
CASE STUDY EXAMPLE
• The SOP is a web browser security mechanism that aims to prevent websites from
attacking each other. It restricts cross-origin interactions in the following ways:
• Scripts: Scripts loaded from one origin cannot access the DOM (Document Object
Model) of documents from a different origin.
• Cookies: Cookies set by scripts from one origin are not accessible to scripts from a
different origin.
• TLS(Transport Layer Security) provides web apps with the ability to authenticate the server's
domain name and protect data while it's being transported.
Authentication
• Because cloud data is widely accessible via the internet, the primary function
of an access control mechanism in the cloud ecosystem is user authentication.
• In hosted and virtual services, authentication is the most commonly targeted
attack centre point
• Numerous mitigation techniques for authentication attacks have been
developed
• An example of the authentication standard adopted in the cloud is the Trusted
Platform Module (TPM).
• TPM is commonly available and a more reliable authentication scheme than the
password login verification check.
• A TPM, or a trusted platform module, is a physical or embedded security
technology (microcontroller) that resides on a computer's motherboard or in
its processor. TPMs use cryptography to help securely store essential and
critical information on PCs to enable platform authentication.
• It uses an IF-MAP (Interface for Metadata Access Points) standard to exchange
information about user identities, access policies, and device statuses
between cloud-based authentication services and network devices.
2. service provider layer
• the important components of this layer include resource
provisioning, SLA Monitor, Scheduler & Dispatcher,
Metering, Load Balancer, Accounting, Policy Management
and Advance Resource Reservation Monitor.
• Security concerns in the service provider layer include Data
transmission, Privacy, People and Identity, Infrastructure
management, Audit and Compliance, Cloud integrity and
Biding Issues.
Identity and access management
• Identity and access management (IAM) involves the Authentication, Authorization and
Auditing (AAA) of users accessing cloud services.